CVE-2025-0128

HIGH

Palo Alto Networks PAN-OS - DoS

Title source: llm
STIX 2.1

Description

A denial-of-service (DoS) vulnerability in the Simple Certificate Enrollment Protocol (SCEP) authentication feature of Palo Alto Networks PAN-OS® software enables an unauthenticated attacker to initiate system reboots using a maliciously crafted packet. Repeated attempts to initiate a reboot causes the firewall to enter maintenance mode. Cloud NGFW is not affected by this vulnerability. Prisma® Access software is proactively patched and protected from this issue.

Scores

CVSS v4 8.7
EPSS 0.0011
EPSS Percentile 29.5%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/AU:Y/R:U/V:C/RE:M/U:Amber

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-754
Status published
Products (8)
Palo Alto Networks/Cloud NGFW All
Palo Alto Networks/PAN-OS 10.1.0 - 10.1.14-h11
Palo Alto Networks/PAN-OS 10.2.0 - 10.2.10-h17
Palo Alto Networks/PAN-OS 11.0.0 - 11.0.6
Palo Alto Networks/PAN-OS 11.1.0 - 11.1.5
Palo Alto Networks/PAN-OS 11.2.0 - 11.2.3
Palo Alto Networks/Prisma Access 10.2.0 - 10.2.4-h36
Palo Alto Networks/Prisma Access 11.2.0 - 11.2.4-h5
Published Apr 11, 2025
Tracked Since Feb 18, 2026